Display:

Use of Company Assets

IT Team

  • Module: Personal Data & Privacy

    Module: Personal Data & Privacy

    You don’t expect your employees to memorize everything about privacy and personal data, but that’s the message they’ll get if you dump a ton of regulation-focused material on them. Make it clear that they just need to know the...

    15✨
    View
  • Received a request to transfer data?

    Received a request to transfer data?

    What counts as "personal data" to one person might not be to another, which can create major headaches. Use this decision tree to remedy your ills and ensure all your teams have a healthy dose of privacy know-how. In five simple steps, it guides them...

    8✨
    View
  • Data Processing Agreement checklist

    Data Processing Agreement checklist

    Everyone tells their teams to do their due diligence, but do they know what that actually looks like? This job aid gives your IT and procurement teams the ultimate vendor contract checklist, covering everything from contract basics to data-processing...

    8✨
    View
  • Give your third-parties everything they need to align with your ethical and legal standards with this concise infographic.

    Third Parties Code of Conduct

    Your third-parties are essential to your success, especially when they’re acting on your behalf. Keep everyone on the same page and avoid any nasty surprises with this concise infographic.  Packed with practical guidance, it clearly outlines...

    6✨
    View
  • Quickly train your third parties on your org’s core values and expectations with this thorough and straightforward module.

    Third Party Code of Conduct Training

    Your third parties—like vendors, consultants, suppliers, and business partners—are essentially an extension of your org, so they need to know and uphold your standards. Share this practical module with them to make sure they get it. In about...

    12✨
    View
  • Going on a trip? Protect your data!

    Going on a trip? Protect your data!

    Show your folks these simple, but vital, rules for keeping company and personal info from being stolen while traveling. It’s not always intuitive that travel creates risk—people lose stuff, they get their computer stolen, hackers target...

    6✨
    View